{"title":"基于双核和EFI的敏感文件管理新架构","authors":"Zijian Deng, Xuejia Lai","doi":"10.1109/SITIS.2007.38","DOIUrl":null,"url":null,"abstract":"How to protect the sensitive information from unauthorized disclosure is one of the problems in computer security. In this paper we present a new method for preventing the sensitive file from unauthorized disclosure, security file management (SFM). SFM relies on dual-core technology, extensible firmware interface and trusted computing to provide a much high level of security than current solutions. All operations of sensitive files are run in trusted boundary. In this paper, we present the architecture of SFM, the initial designer and the security analysis.","PeriodicalId":234433,"journal":{"name":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A New Architecture of Sensitive File Management Based on Dual-Core and EFI\",\"authors\":\"Zijian Deng, Xuejia Lai\",\"doi\":\"10.1109/SITIS.2007.38\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"How to protect the sensitive information from unauthorized disclosure is one of the problems in computer security. In this paper we present a new method for preventing the sensitive file from unauthorized disclosure, security file management (SFM). SFM relies on dual-core technology, extensible firmware interface and trusted computing to provide a much high level of security than current solutions. All operations of sensitive files are run in trusted boundary. In this paper, we present the architecture of SFM, the initial designer and the security analysis.\",\"PeriodicalId\":234433,\"journal\":{\"name\":\"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SITIS.2007.38\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SITIS.2007.38","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A New Architecture of Sensitive File Management Based on Dual-Core and EFI
How to protect the sensitive information from unauthorized disclosure is one of the problems in computer security. In this paper we present a new method for preventing the sensitive file from unauthorized disclosure, security file management (SFM). SFM relies on dual-core technology, extensible firmware interface and trusted computing to provide a much high level of security than current solutions. All operations of sensitive files are run in trusted boundary. In this paper, we present the architecture of SFM, the initial designer and the security analysis.